Loading...
KP Kerala Prep
4 days🏆 Top scorer wins ₹500Compete now →
Graduate Level intermediate Computer Literacy Networking Cybersecurity Cloud Computing AI

Computer Literacy Advanced: Networking, Cybersecurity, Cloud Computing & AI for PSC

LAN/WAN/MAN, internet protocols, cybersecurity concepts, cloud computing, and AI basics for Kerala PSC graduate-level exams.

Published: 20 Apr 2026

Advanced computer literacy questions appear in most PSC exams — typically 3-6 questions covering networking, internet, cybersecurity, and emerging technologies. This note focuses on the factual content examiners test.

Computer Networks — Types

Network TypeFull FormRangeExample
PANPersonal Area Network~10 metersBluetooth between phone and earbuds
LANLocal Area NetworkBuilding/campus (up to ~1 km)Office network, school computer lab
MANMetropolitan Area NetworkCity-wide (~50-100 km)Cable TV network; city-wide Wi-Fi
WANWide Area NetworkCountry/continent/globalInternet is the largest WAN
WLANWireless LANSame as LAN but wirelessWi-Fi network
VPNVirtual Private NetworkOver internetSecure remote access to office network

PSC favourite: Internet = world’s largest WAN. LAN = within a building. MAN = within a city. The question usually asks you to match the type to the range.

Network Topologies

TopologyDescriptionAdvantage
BusAll devices on a single cableSimple; cheap
StarAll devices connect to a central hub/switchMost common; one failure doesn’t affect others
RingDevices in a circular loopEqual access; no collision
MeshEvery device connects to every otherMost reliable; redundant; expensive
TreeHierarchical; combination of star and busScalable

Network Devices

DeviceFunction
HubBroadcasts data to all ports; no intelligence; Layer 1
SwitchSends data only to intended device (MAC address); Layer 2
RouterConnects different networks; uses IP addresses; Layer 3
ModemConverts digital to analog (and vice versa) for internet over phone lines
GatewayConnects two different types of networks
FirewallFilters incoming/outgoing traffic; security device
BridgeConnects two LANs of the same type
Access PointProvides wireless connectivity to a wired network

Internet Protocols

ProtocolFull FormFunction
TCP/IPTransmission Control Protocol / Internet ProtocolFoundation of internet; ensures reliable data delivery
HTTPHyperText Transfer ProtocolWeb page transfer (unsecured)
HTTPSHTTP SecureEncrypted web transfer (uses SSL/TLS)
FTPFile Transfer ProtocolFile upload/download between computers
SMTPSimple Mail Transfer ProtocolSending emails
POP3Post Office Protocol v3Receiving emails (downloads to device)
IMAPInternet Message Access ProtocolReceiving emails (keeps on server)
DNSDomain Name SystemConverts domain names to IP addresses; “phonebook of the internet”
DHCPDynamic Host Configuration ProtocolAutomatically assigns IP addresses
SSHSecure ShellSecure remote login
TelnetRemote login (unsecured)
VoIPVoice over Internet ProtocolPhone calls over internet (Skype, WhatsApp calls)
IPInternet ProtocolAddressing and routing; IPv4 (32-bit) and IPv6 (128-bit)

Email protocols: SMTP = sending. POP3 = receiving (downloads). IMAP = receiving (stays on server). DNS = domain to IP. These four are asked constantly.

IP Addressing

VersionBitsFormatExampleAddresses
IPv432-bitDecimal (4 octets)192.168.1.1~4.3 billion
IPv6128-bitHexadecimal (8 groups)2001:0db8:85a3::8a2e~340 undecillion (virtually unlimited)

OSI Model (7 Layers)

LayerNameFunctionProtocol/Device
7ApplicationUser interface; softwareHTTP, FTP, SMTP, DNS
6PresentationData format, encryptionSSL, JPEG, GIF
5SessionSession managementNetBIOS
4TransportReliable delivery; error checkTCP, UDP
3NetworkRouting; IP addressingIP; Router
2Data LinkMAC addressing; framingSwitch, Bridge
1PhysicalHardware; cables; signalsHub, Cable, NIC

Mnemonic (top to bottom):All People Seem To Need Data Processing” = Application, Presentation, Session, Transport, Network, Data Link, Physical.

Cybersecurity

Types of Cyber Threats

ThreatDescription
VirusMalicious program that attaches to files; needs human action to spread
WormSelf-replicating; spreads without human action; exploits network vulnerabilities
Trojan HorseDisguised as legitimate software; does not self-replicate
RansomwareEncrypts victim’s data; demands ransom for decryption key (e.g., WannaCry, 2017)
PhishingFake emails/websites to steal credentials; social engineering attack
SpywareSecretly monitors user activity
AdwareDisplays unwanted advertisements
KeyloggerRecords keystrokes to steal passwords
DDoSDistributed Denial of Service; floods server with traffic to crash it
Man-in-the-MiddleAttacker intercepts communication between two parties
SQL InjectionInserts malicious SQL code into database queries
Zero-day attackExploits unknown vulnerability before patch is available

PSC distinctions: Virus = needs host file + human action. Worm = self-replicating, no human action. Trojan = disguised, no self-replication. Ransomware = encrypts + demands money.

Security Measures

MeasureFunction
FirewallFilters network traffic; blocks unauthorized access
AntivirusDetects and removes malware
EncryptionConverts data into unreadable code; only decrypted with key
SSL/TLSSecure Sockets Layer / Transport Layer Security; encrypts web traffic (HTTPS)
Two-Factor Authentication (2FA)Two forms of identity verification (password + OTP)
Biometric securityFingerprint, iris scan, face recognition
Digital SignatureVerifies identity and integrity of digital documents
Digital CertificateIssued by Certificate Authority (CA); authenticates website identity

Important Cybersecurity Terms

TermMeaning
HackerWhite hat (ethical), Black hat (criminal), Grey hat (mixed)
CERT-InIndian Computer Emergency Response Team; under MeitY; handles cyber incidents
Cyber crimeIn India governed by IT Act, 2000 (amended 2008)
Dark WebPart of internet not indexed by search engines; accessed via Tor browser
CookieSmall text file stored by websites on user’s browser
CacheTemporary storage of frequently accessed data for faster retrieval

Cloud Computing

ConceptDetail
DefinitionDelivery of computing services (servers, storage, databases, networking, software) over the internet (“the cloud”)
On-demandPay-as-you-use; no upfront hardware investment

Service Models

ModelFull FormWhat You GetExample
IaaSInfrastructure as a ServiceVirtual machines, storage, networkingAmazon AWS EC2, Google Compute
PaaSPlatform as a ServiceDevelopment platform; OS + toolsGoogle App Engine, Heroku
SaaSSoftware as a ServiceReady-to-use software via browserGmail, Google Docs, Zoom, Microsoft 365

Mnemonic:I Pizza Slice” — IaaS = raw ingredients, PaaS = kitchen to cook, SaaS = delivered pizza.

Deployment Models

ModelDescription
Public CloudShared infrastructure; available to anyone (AWS, Azure, Google Cloud)
Private CloudDedicated to one organization
Hybrid CloudCombination of public and private
Community CloudShared by organizations with common concerns

Major Cloud Providers

ProviderCompany
AWSAmazon (market leader)
AzureMicrosoft
Google Cloud (GCP)Google
MeghRajIndian government cloud initiative (GI Cloud)

Artificial Intelligence (AI) Basics

ConceptDefinition
AIMachines that simulate human intelligence — learning, reasoning, problem-solving
Machine Learning (ML)Subset of AI; systems learn from data without explicit programming
Deep LearningSubset of ML; uses neural networks with many layers
Natural Language Processing (NLP)AI that understands and generates human language (e.g., chatbots, translation)
Computer VisionAI that interprets images and videos
RoboticsMachines performing tasks autonomously or semi-autonomously
Neural NetworkComputing system inspired by human brain; nodes (neurons) in layers

AI Milestones

EventYearDetail
Term “Artificial Intelligence” coined1956John McCarthy at Dartmouth Conference
Deep Blue beats Kasparov1997IBM’s chess computer
Watson wins Jeopardy!2011IBM’s NLP system
AlphaGo beats Go champion2016Google DeepMind
ChatGPT released2022OpenAI; generative AI chatbot
Turing Test1950 (proposed)Alan Turing; test if machine can exhibit human-like intelligence

PSC basics: John McCarthy = “Father of AI.” Alan Turing = Turing Test (1950). Machine Learning = learns from data. Deep Learning = neural networks with many layers.

Types of AI

TypeDescriptionExample
Narrow/Weak AIDesigned for specific tasksSiri, Alexa, Google Assistant, chess engines
General/Strong AIHuman-level intelligence across all tasksDoes not exist yet
Super AISurpasses human intelligenceTheoretical concept

Emerging Technologies — Quick Facts

TechnologyKey Fact
BlockchainDecentralized digital ledger; basis of cryptocurrencies; tamper-proof
IoT (Internet of Things)Network of physical devices connected to internet; smart homes, wearables
5GFifth generation mobile network; ~10 Gbps speed; low latency
Big DataExtremely large datasets; characterized by 3Vs — Volume, Velocity, Variety
Quantum ComputingUses qubits (can be 0, 1, or both simultaneously); exponentially faster for certain problems
CryptocurrencyDigital currency using blockchain; Bitcoin (2009, Satoshi Nakamoto) is the first
NFTNon-Fungible Token; unique digital asset on blockchain

Quick Recall

  1. Internet is what type of network? → WAN
  2. DNS does what? → Converts domain names to IP addresses
  3. SMTP is used for? → Sending emails
  4. IPv4 uses how many bits? → 32 bits
  5. OSI model has how many layers? → 7
  6. WannaCry is what type of attack? → Ransomware
  7. IT Act of India? → 2000 (amended 2008)
  8. SaaS example? → Gmail, Google Docs
  9. Father of AI? → John McCarthy
  10. Blockchain is the basis of? → Cryptocurrency (Bitcoin)

Found an error or have a suggestion?